The U.S. Army Electronic Proving Ground (USAEPG) traditionally provides expertise in instrumentation for technology-based systems and is the Army’s designated tester for C4ISR systems, as part of the Army Test and Evaluation Command (ATEC). USAEPG supported the U.S. Army Operational Test Command, under ATEC, during this latest NIE. This year, in addition to supporting with instrumentation, USAEPG brought a network forensics team to the technology-centric field evaluation.

“The [network forensics] team we took out there brought a commercial-off-the-shelf suite of software,” said the Senior Enlisted Advisor for USAEPG, Sgt. Maj. John L. Herring, “and produced a state-of-the-art package that was accessible by everyone that was out there.”

WHITE SANDS MISSILE RANGE, N.M. – The Army Network Integration Evaluation (NIE) is a large-scale, semi-annual field evaluation of network and non-network capabilities. The U.S. Army Electronic Proving Ground (USAEPG) traditionally provides test and evaluation support and instrumentation to NIEs. However, with NIE 14.2, the latest evaluation, USAEPG provided the additional support of a network forensics team that made a positive impact on network troubleshooting, reliability and network protection.(PHOTO BY Amy Walker, U.S. Army PEO C3T // RELEASED 20140117)

According to Ed D. Watt, an Army civilian and project engineer with USAEPG, network forensics offers network operators and systems administrators the ability to monitor network traffic and data in real time. This allows technology professionals to establish a baseline of how normal network traffic should behave on the monitored network. This capability enables these professionals to identify network issues quickly, like improperly configured or failing equipment and unauthorized use, among other network issues.

“When you start cleaning up the small things, the network gets better, data goes faster, all of a sudden, it’s a force multiplier,” said Watt referring to the value of an efficient network for military operations.

The Network Forensics Team provided support to all the participants of NIE, in essence creating a help desk-like support element for the event. Participants asked the Network Forensics Team for assistance in characterizing or optimizing their respective network, whether carrying data or voice, at the tactical or operational levels. The Network Forensics Team responded to nearly 100 requests for assistance, all with successful outcomes, according to Ari D. Nguyen, who is also an Army civilian and project engineer with USAEPG.

“It’s a very good help desk tool, with very quick turnaround,” said Nguyen. “If something was acting up, you may not know it at the application or user level, but for them [the Network Forensics Team], they could see it [network issue] pop up.”

Offering a Soldier’s perspective, Herring said network forensics should be considered for all future network exercises, evaluations or demonstrations, because of the fidelity of the information available to operators, engineers and evaluators. Network forensics makes it easy to troubleshoot problems, tune a network, recover lost data and enforce network integrity.

“When people were probing the network, those guys could see all that,” he added. “It’s a phenomenal tool for commanders to use.”

Network forensics, though relatively new, is increasingly becoming the tool of choice on civilian and corporate networks, offering not only network tuning, but also intrusion detection. This tool is considered a proactive network protection tool, as it allows network operators to identify unusual network traffic and respond to compromised systems well ahead of more traditional means of detection, like antivirus.

“Any large-scale network test could benefit from this [network forensics],” said Watt. “There is a niche and it needs to get filled; people need this information.”